Book picks similar to
Microsoft Word 2013 Step by Step by Joan Lambert
computers
word
reference
office-software
Site Reliability Engineering: How Google Runs Production Systems
Betsy Beyer - 2016
So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google's Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world. You'll learn the principles and practices that enable Google engineers to make systems more scalable, reliable, and efficient--lessons directly applicable to your organization.This book is divided into four sections: Introduction--Learn what site reliability engineering is and why it differs from conventional IT industry practicesPrinciples--Examine the patterns, behaviors, and areas of concern that influence the work of a site reliability engineer (SRE)Practices--Understand the theory and practice of an SRE's day-to-day work: building and operating large distributed computing systemsManagement--Explore Google's best practices for training, communication, and meetings that your organization can use
The Mythical Man-Month: Essays on Software Engineering
Frederick P. Brooks Jr. - 1975
With a blend of software engineering facts and thought-provoking opinions, Fred Brooks offers insight for anyone managing complex projects. These essays draw from his experience as project manager for the IBM System/360 computer family and then for OS/360, its massive software system. Now, 45 years after the initial publication of his book, Brooks has revisited his original ideas and added new thoughts and advice, both for readers already familiar with his work and for readers discovering it for the first time.The added chapters contain (1) a crisp condensation of all the propositions asserted in the original book, including Brooks' central argument in The Mythical Man-Month: that large programming projects suffer management problems different from small ones due to the division of labor; that the conceptual integrity of the product is therefore critical; and that it is difficult but possible to achieve this unity; (2) Brooks' view of these propositions a generation later; (3) a reprint of his classic 1986 paper "No Silver Bullet"; and (4) today's thoughts on the 1986 assertion, "There will be no silver bullet within ten years."
What's New in Java 7?
Madhusudhan Konda - 2011
Madhusudhan Konda provides an overview of these, including strings in switch statements, multi-catch exception handling, try-with-resource statements, the new File System API, extensions of the JVM, support for dynamically-typed languages, and the fork and join framework for task parallelism.
The New Marine Aquarium Step by Step Set Up and Stocking Guide
Michael S. Paletta - 1998
By helping newcomers avoid the pitfalls of outdated, high-maintenance filtration techniques, the author offers an easy-to-follow route to long-term success with live rock, appropriate equipment, aquascaping, disease prevention, and essential husbandry techniques. Includes a photographic guide to selecting fishes, with dozens of hardy choices that are highly recommended for beginning hobbyists or others wanting beautiful, interesting, and long-lived marine species.
Fluent Python: Clear, Concise, and Effective Programming
Luciano Ramalho - 2015
With this hands-on guide, you'll learn how to write effective, idiomatic Python code by leveraging its best and possibly most neglected features. Author Luciano Ramalho takes you through Python's core language features and libraries, and shows you how to make your code shorter, faster, and more readable at the same time.Many experienced programmers try to bend Python to fit patterns they learned from other languages, and never discover Python features outside of their experience. With this book, those Python programmers will thoroughly learn how to become proficient in Python 3.This book covers:Python data model: understand how special methods are the key to the consistent behavior of objectsData structures: take full advantage of built-in types, and understand the text vs bytes duality in the Unicode ageFunctions as objects: view Python functions as first-class objects, and understand how this affects popular design patternsObject-oriented idioms: build classes by learning about references, mutability, interfaces, operator overloading, and multiple inheritanceControl flow: leverage context managers, generators, coroutines, and concurrency with the concurrent.futures and asyncio packagesMetaprogramming: understand how properties, attribute descriptors, class decorators, and metaclasses work"
The Pattern on the Stone: The Simple Ideas that Make Computers Work
William Daniel Hillis - 1998
What they don't realize—and what Daniel Hillis's short book brilliantly demonstrates—is that computers' seemingly complex operations can be broken down into a few simple parts that perform the same simple procedures over and over again.Computer wizard Hillis offers an easy-to-follow explanation of how data is processed that makes the operations of a computer seem as straightforward as those of a bicycle. Avoiding technobabble or discussions of advanced hardware, the lucid explanations and colorful anecdotes in The Pattern on the Stone go straight to the heart of what computers really do.Hillis proceeds from an outline of basic logic to clear descriptions of programming languages, algorithms, and memory. He then takes readers in simple steps up to the most exciting developments in computing today—quantum computing, parallel computing, neural networks, and self-organizing systems.Written clearly and succinctly by one of the world's leading computer scientists, The Pattern on the Stone is an indispensable guide to understanding the workings of that most ubiquitous and important of machines: the computer.
iPod & iTunes For Dummies
Tony Bove - 2003
You'll learn about everything from buying music and videos, importing music, and burning CDs to setting up play lists, transferring and viewing photos, adding podcasts, maintaining battery life, and synchronizing information. Order your copy today!
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Hal Abelson - 2008
We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation, collaboration, entertainment, and democratic participation. But the same engineering marvels are shattering centuries-old assumptions about privacy, identity, free expression, and personal control as more and more details of our lives are captured as digital data.Can you control who sees all that personal information about you? Can email be truly confidential, when nothing seems to be private? Shouldn’t the Internet be censored the way radio and TV are? Is it really a federal crime to download music? When you use Google or Yahoo! to search for something, how do they decide which sites to show you? Do you still have free speech in the digital world? Do you have a voice in shaping government or corporate policies about any of this?Blown to Bits offers provocative answers to these questions and tells intriguing real-life stories. This book is a wake-up call to the human consequences of the digital explosion.Preface xiii Chapter 1: Digital Explosion: Why Is It Happening, and What Is at Stake? 1Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned 19Chapter 3: Ghosts in the Machine: Secrets and Surprises of Electronic Documents 73Chapter 4: Needles in the Haystack: Google and Other Brokers in the Bits Bazaar 109Chapter 5: Secret Bits: How Codes Became Unbreakable 161Chapter 6: Balance Toppled: Who Owns the Bits? 195Chapter 7: You Can’t Say That on the Internet: Guarding the Frontiers of Digital Expression 229Chapter 8: Bits in the Air: Old Metaphors, New Technologies, and Free Speech 259 Conclusion: After the Explosion 295Appendix: The Internet as System and Spirit 301Endnotes 317Index 347
How You Play the Game: A Philosopher Plays Minecraft (Kindle Single)
Charlie Huenemann - 2015
At a glance, it bears few similarities to any place we know and inhabit. But upon closer examination, the differences between this complex virtual reality and our own might not be as vast as we think. In “How You Play the Game,” author and philosopher Charlie Huenemann looks philosophically at the game of Minecraft (“What is the point of this game? How does one win? Well, this depends on what you want to do”) and grapples with the ethical conundrums, existential crises and moral responsibilities of the virtual realm. From the Overworld to the Ender Dragon, Huenemann offers an entertaining, insightful and often hilarious examination of Minecraft and the strange worlds—both virtual and not—surrounding it.Charlie Huenemann is a Professor of Philosophy at Utah State University. He writes for 3quarksdaily, and has published several books on the history of philosophy.Cover design by Adil Dara.
My Patients and Me: Fifty Years of General Practice
Jane Little - 2017
She knew instantly that her decision to work in general practice was the ‘biggest and worst mistake of her life’. Fortunately, however, this did not deter her from continuing in general practice, and this fascinating memoir (spanning half a century) is testament to her resilience and professionalism, as well as her pragmatic and charismatic personality. She shares real stories about real people in this intriguing book. Some stories are truly heart-breaking and will have you reaching for the tissues (such as the times when she has lost patients, and encountered and supported abused children and rape victims). But it isn’t all serious. There are lots of light-hearted and heart-warming moments too, such as the stories about Jessie-dog – her bodyguard when she made home visits, and the time when she helped a large (and desperately in need) family to get rehoused, and her time as a country GP. She also recalls with honesty and candidness, the prejudice and unimaginable pressure she had to contend with, as a young female GP in the 1960s. As well as a plethora of fascinating stories, experiences and case studies, this book also gives us, as 21st Century readers, a glimpse into the rapid changes in general practice and the NHS in general. Whether you’re in general practice, or you’re a medical professional, or you have a penchant for all kinds of autobiographies/memoirs, you will find this a thought-provoking and captivating book that’s impossible to put down. Take a peek at the ‘Look Inside’ feature now and be prepared to be instantly intrigued.
The Devil's Deceptions: Is There Life After Death?
Ginger Baum - 2019
In a world that is overflowing with man's traditions, that often put a dark cloud over God's truth, you will be astonished by the answers that now await you concerning the mysteries of death.
What Just Happened: A Chronicle from the Information Frontier
James Gleick - 2002
These machines had wondrous powers, yet made unexpected demands on their owners. Telephones broke free of the chains that had shackled them to bedside tables and office desks. No one was out of touch, or wanted to be out of touch. Instant communication became a birthright. A new world, located no one knew exactly where, came into being, called "virtual" or "online," named "cyberspace" or "the Internet" or just "the network." Manners and markets took on new shapes and guises. As all this was happening, James Gleick, author of the groundbreaking" Chaos," columnist for" The New York Times" "Magazine," and--very briefly--an Internet entrepreneur, emerged as one of our most astute guides to this new world. His dispatches--by turns passionate, bewildered, angry, and amazed--form an extraordinary chronicle. Gleick loves what the network makes possible, and he hates it. Software makers developed a strangely tolerant view of an ancient devil, the product defect. One company, at first a feisty upstart, seized control of the hidden gears and levers of the new economy. We wrestled with novel issues of privacy, anonymity, and disguise. We found that if the human species is evolving a sort of global brain, it's susceptible to new forms of hysteria and multiple-personality disorder. "What Just Happened" is at once a remarkable portrait of a world in the throes of transformation and a prescient guide to the transformation still to come.
Rails Antipatterns: Best Practice Ruby on Rails Refactoring
Chad Pytel - 2010
Rails(TM) AntiPatterns identifies these widespread Rails code and design problems, explains why they're bad and why they happen--and shows exactly what to do instead.The book is organized into concise, modular chapters--each outlines a single common AntiPattern and offers detailed, cookbook-style code solutions that were previously difficult or impossible to find. Leading Rails developers Chad Pytel and Tammer Saleh also offer specific guidance for refactoring existing bad code or design to reflect sound object-oriented principles and established Rails best practices. With their help, developers, architects, and testers can dramatically improve new and existing applications, avoid future problems, and establish superior Rails coding standards throughout their organizations.This book will help you understand, avoid, and solve problems withModel layer code, from general object-oriented programming violations to complex SQL and excessive redundancy Domain modeling, including schema and database issues such as normalization and serialization View layer tools and conventions Controller-layer code, including RESTful code Service-related APIs, including timeouts, exceptions, backgrounding, and response codes Third-party code, including plug-ins and gems Testing, from test suites to test-driven development processes Scaling and deployment Database issues, including migrations and validations System design for "graceful degradation" in the real world
Cybersecurity and Cyberwar: What Everyone Needs to Know(r)
P.W. Singer - 2013
Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood.In Cybersecurity and CyberWar: What Everyone Needs to Know�, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know� is the definitive account on the subject for us all, which comes not a moment too soon.What Everyone Needs to Know� is a registered trademark of Oxford University Press.
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick - 2001
Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
